Security for everyone

CVE-2008-2650 Scanner

Detects 'Directory Traversal' vulnerability in CMSimple affects v. 3.1.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one


Parent Category

CVE-2008-2650 Scanner Detail

CMSimple is a content management system that is used for creating and managing small websites. It is a lightweight, user-friendly platform that is particularly popular among small business owners and individuals who want a simple yet effective web presence. With its intuitive interface and range of customizable templates, CMSimple has become a go-to choice for those who want to create websites without having to deal with complicated coding.

However, in 2008, a serious vulnerability was detected in CMSimple version 3.1. CVE-2008-2650 was a directory traversal vulnerability that allowed remote attackers to execute arbitrary local files on a website. This vulnerability was particularly dangerous because it could be exploited even if register_globals was enabled in the system. Attackers could achieve remote file execution by including adm.php and then invoking the upload action.

The exploitation of this vulnerability could have potentially devastating consequences for a website and its users. Hackers could gain access to sensitive information, install malicious software, or even take control of the entire website. This could lead to a loss of trust for the website owner, damage to their reputation, and a loss of business.

Thanks to the pro features of the platform, readers of this article can stay up-to-date on the latest vulnerabilities in their digital assets. The platform offers comprehensive vulnerability scanning, threat intelligence feeds, and real-time alerts to keep your websites and systems safe from attacks. Don't wait until it's too late - protect your digital assets today with



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture